Manage the Enterprise Attack Surface

Organizations often see security as collections of identified vulnerabilities in silos. This isolation perspective misses the proverbial big picture--the "attack surface". Learn how to manage your organization's "attack surface" to help prioritize risk mitigation."

The rise of third-party cloud-based file storage applications has brought flexibility and ease of data access to users and businesses alike. Commonly used applications such as Dropbox, OneDrive and Go...

How do you combine the accessibility and file-sharing functionality of public cloud storage with the security and pricing advantages of an on-premises solution? Connected Data thinks it has the answer...

This set of sample emails will help you build a communication plan to help raise user awareness of security threats and best practices -- from avoiding phishing attacks to choosing effective passwords...

The recent Apple Watch event provided some highly anticipated details, such as availability, cost, apps, and battery life. This ebook covers those basics and considers what role the Watch could play i...

Our Travel and Entertainment Expense Policy will help you define your organization's policies and procedures for incurring and receiving reimbursement for travel and entertainment expenses. It provide...

Our Travel and Entertainment Expense Policy will help you define your organization's policies and procedures for incurring and receiving reimbursement for travel and entertainment expenses. It provide...